Lucene search

K
attackerkbAttackerKBAKB:3A0452AA-1A50-41D3-943C-085C00734C11
HistoryNov 09, 2022 - 12:00 a.m.

CVE-2022-41080

2022-11-0900:00:00
attackerkb.com
18
cve-2022-41080
elevation of privilege
bypassing eems protections
code execution
exploit chain

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.216 Low

EPSS

Percentile

96.5%

Microsoft Exchange Server Elevation of Privilege Vulnerability

Recent assessments:

zeroSteiner at January 10, 2023 3:53pm UTC reported:

This is an alternative method for bypassing Exchange Emergency Mitigation Service (EEMS) protections for the ProxyNotShell exploit chain. When this CVE is combined with CVE-2022-41082, they yield code execution as NT AUTHORITY\SYSTEM.

Installing the original patches from Microsoft that were released in November fix this exploit chain as well. The technique is arguably redundant when EEMS can be bypassed using various encoding techniques. This alternative vector is likely most valuable when used to avoid generating exploitation following the original pattern.

Assessed Attacker Value: 3
Assessed Attacker Value: 3Assessed Attacker Value: 3

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.216 Low

EPSS

Percentile

96.5%